A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
Xiaoying JiaDebiao HeNeeraj KumarKim-Kwang Raymond ChooPublished in: IEEE Syst. J. (2020)
Keyphrases
- provably secure
- key management
- authentication scheme
- public key
- signature scheme
- security model
- secret key
- standard model
- bilinear pairings
- blind signature
- security analysis
- diffie hellman
- hash functions
- ad hoc networks
- blind signature scheme
- public key cryptography
- secret sharing scheme
- wireless sensor networks
- group communication
- signcryption scheme
- private key
- secure communication
- user authentication
- key distribution
- security protocols
- security requirements
- peer to peer